Crooks use weaponized coronavirus map to deliver malware

6 years ago

While WHO declares the coronavirus outbreak a pandemic, crooks are attempting to exploit the situation to monetize their efforts. Cybercriminals…

Talos found tens of dangerous flaws in WAGO Controllers

6 years ago

Cisco Talos experts discovered tens of flaws in WAGO products that expose controllers and human-machine interface (HMI) panels to remote…

Avast disables the JavaScript engine component due to a severe issue

6 years ago

Antivirus maker Avast has disabled a core component of its antivirus to address a severe vulnerability that would have allowed…

RCE in popular ThemeREX WordPress Plugin has been actively exploited

6 years ago

The WordPress plugin 'ThemeREX Addons' is affected by a critical vulnerability that could allow remote attackers to execute arbitrary code.…

Office network at the European Network of Transmission System Operators for Electricity (ENTSO-E) breached

6 years ago

The European Network of Transmission System Operators for Electricity (ENTSO-E) disclose a security breach this week. The European Network of…

Bugs in Avast AntiTrack expose users to cyber attacks

6 years ago

A flaw in the impacting Avast and AVG AntiTrack privacy software could expose users to browser hijacking and Man-in-The-Middle (MiTM)…

Microsoft’s Patch Tuesday updates for March 2020 fix 115 issues

6 years ago

Microsoft’s Patch Tuesday updates for March 2020 address 115 vulnerabilities, 26 issues have been rated as critical severity. Microsoft’s Patch…

Microsoft accidentally reveals Wormable Win SMBv3 CVE-2020-0796 Flaw

6 years ago

Today Microsoft accidentally leaked info about a new wormable vulnerability (CVE-2020-0796) in the Microsoft Server Message Block (SMB) protocol. Today…

Microsoft disrupted US-Based Infrastructure of the Necurs botnet

6 years ago

Microsoft announced that it took over the US-based infrastructure used by the infamous Necurs spam botnet that infected millions of computers.…

Hackers use hackers spreading tainted hacking tools in long-running campaign

6 years ago

Who is hacking the hackers? Experts from Cybereason a mysterious hackers group is targeting other hackers by spreading tainted hacking…

This website uses cookies.